Author:
Nikooghadam Mahdi,Amintoosi Haleh,Shahriari Hamid Reza
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference57 articles.
1. Mohanty SP, Choppali U, Kougianos E (2016) Everything you wanted to know about smart cities: the internet of things is the backbone. IEEE Consum Electron Mag 5(3):60–70
2. Dharminder D, Mishra D, Li X (2020) Construction of rsa-based authentication scheme in authorized access to healthcare services. J Med Syst 44:1–9
3. Gupta A, Tripathi M, Muhuri S, Singal G, Kumar N (2022) A secure and lightweight anonymous mutual authentication scheme for wearable devices in medical internet of things. J Inf Secur Appl 68:103259
4. Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst (TOCS) 8(1):18–36
5. Cremers CJF et al (2006) Scyther: semantics and verification of security protocols. Eindhoven university of Technology Eindhoven, Netherlands
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献